Marcelo,
From: Marcelo Tosatti
Subject: Re: EuroSec'12 Presentation (ASLR reduces effect of KSM)
Date: Fri, 13 Apr 2012 21:47:47 -0300
> On Thu, Apr 12, 2012 at 08:24:57PM +0900, Kuniyasu Suzaki wrote:
> >
> > Dear,
> >
> > I made a presentation which measures OS security functions(ASLR,
> >
On 04/14/2012 11:37 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:05:29 +0800
> Xiao Guangrong wrote:
>
>> Thanks for Avi and Marcelo's review, i have simplified the whole things
>> in this version:
>> - it only fix the page fault with PFEC.P = 1 && PFEC.W = 0 that means
>> unlock set_s
On 04/14/2012 09:12 AM, Takuya Yoshikawa wrote:
> Hi,
>
> On Wed, 11 Apr 2012 11:11:07 +0800
> Xiao Guangrong wrote:
>
>>> restart:
>>> - list_for_each_entry_safe(sp, node, &kvm->arch.active_mmu_pages, link)
>>> - if (kvm_mmu_prepare_zap_page(kvm, sp, &invalid_list))
>>> -
On 04/14/2012 10:44 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:12:41 +0800b
> Xiao Guangrong wrote:
>
>> It is used to walk all the sptes of the specified pte_list, after
>> this, the code of pte_list_walk can be removed
>>
>> And it can restart the walking automatically if the spte is
On 04/14/2012 11:01 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:14:26 +0800
> Xiao Guangrong wrote:
>
>> Using bit 1 (PTE_LIST_WP_BIT) in rmap store the write-protect status
>> to avoid unnecessary shadow page walking
>>
>> Signed-off-by: Xiao Guangrong
>> ---
>> arch/x86/kvm/mmu.c |
On 04/14/2012 10:26 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:11:45 +0800
> Xiao Guangrong wrote:
>
>> +/* Return true if the spte is dropped. */
>
> Return value does not correspond with the function name so it is confusing.
>
That is why i put comment here.
> People may think t
On 04/14/2012 10:15 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:10:45 +0800
> Xiao Guangrong wrote:
>
>> static u64 *rmap_get_next(struct rmap_iterator *iter)
>> {
>> +u64 *sptep = NULL;
>> +
>> if (iter->desc) {
>> if (iter->pos < PTE_LIST_EXT - 1) {
>> -
On 04/15/2012 11:16 PM, Avi Kivity wrote:
> On 04/13/2012 01:14 PM, Xiao Guangrong wrote:
>> Using bit 1 (PTE_LIST_WP_BIT) in rmap store the write-protect status
>> to avoid unnecessary shadow page walking
>>
>> Signed-off-by: Xiao Guangrong
>> ---
>> arch/x86/kvm/mmu.c | 40 ++
Rik van Riel redhat.com> writes:
>
> On 04/11/2012 01:21 PM, Chegu Vinod wrote:
> >
> > Hello,
> >
> > While running an AIM7 (workfile.high_systime) in a single 40-way (or a
single
> > 60-way KVM guest) I noticed pretty bad performance when the guest was booted
> > with 3.3.1 kernel when compar
On 15.04.2012 11:44, Avi Kivity wrote:
On 04/12/2012 09:32 PM, Gerhard Wiesinger wrote:
Hello,
I'm having problems with recents kernels and qemu-kvm with a DOS VM:
TD286
System: Bad selector: 0007
System: Bad selector: 0D87
System: Bad selector: 001F
System: Bad selector: 0007
GP at 0020 21D4 E
From: David Gibson
On target-ppc, our table of CPU types and features encodes the features as
found on the hardware, regardless of whether these features are actually
usable under TCG or KVM. We already have cases where the information from
the cpu table must be fixed up to account for limitatio
I got lots of useful feedback from v0 so I thought
sending out a brain dump again would be a good idea.
This is mainly to show how I'm trying to address the
comments I got from the previous round. Flames/feedback
are wellcome!
Changes from v0:
- Tweaked setup MSRs a bit
- Keep ISR bit set. Before
On Fri, 13 Apr 2012, 'Asias He wrote:
> From: Asias He
>
> Commit b4a932d175c6aa975c456e9b05339aa069c961cb sets sdl's .start
> ops to sdl__stop which makes the sdl never start.
>
> Fix it up.
>
> Signed-off-by: Asias He
Both patches applied! Thnx!
--
To unsubscribe from this list: send the li
On Fri, 13 Apr 2012, 'Asias He wrote:
> From: Asias He
>
> Previously, we use mmaped host root partition as guest's root
> filesystem. As virtio-9p based root filesystem is supported,
> mmaped host root partition approach is not used anymore.
>
> It is useful to use raw block device as guest's d
On 04/13/2012 01:14 PM, Xiao Guangrong wrote:
> Using bit 1 (PTE_LIST_WP_BIT) in rmap store the write-protect status
> to avoid unnecessary shadow page walking
>
> Signed-off-by: Xiao Guangrong
> ---
> arch/x86/kvm/mmu.c | 40 ++--
> 1 files changed, 34 inser
On 04/14/2012 05:00 AM, Takuya Yoshikawa wrote:
> On Fri, 13 Apr 2012 18:11:13 +0800
> Xiao Guangrong wrote:
>
> > The reture value of __rmap_write_protect is either 1 or 0, use
> > true/false instead of these
>
> ...
>
> > @@ -1689,7 +1690,7 @@ static void mmu_sync_children(struct kvm_vcpu *vcpu,
On 04/15/2012 12:42 PM, Jens Kasten wrote:
> Hi list,
>
> I use the PAX patch in the kernel 3.2.14.
> My qemu-kvm guest running on a gentoo hardend as host.
> When I try to start my kvm guest I get:
>
>
> PAX: size overflow detected in function wrmsr_interception
> arch/x86/kvm/svm.c:3115
> Pid: 35
On 04/11/2012 09:59 PM, Eric Northup wrote:
> On Wed, Apr 11, 2012 at 7:45 AM, Avi Kivity wrote:
> > On 04/11/2012 05:11 AM, Peijie Yu wrote:
> >> For this problem, i found that panic is caused by
> >> BUG_ON(in_nmi()) which means NMI happened during another NMI Context;
> >> But i check the
Hi list,
I use the PAX patch in the kernel 3.2.14.
My qemu-kvm guest running on a gentoo hardend as host.
When I try to start my kvm guest I get:
PAX: size overflow detected in function wrmsr_interception
arch/x86/kvm/svm.c:3115
Pid: 3565, comm: kvm_webserver Not tainted 3.2.14-rsbac-2.57-sec
On 04/12/2012 09:32 PM, Gerhard Wiesinger wrote:
> Hello,
>
> I'm having problems with recents kernels and qemu-kvm with a DOS VM:
> TD286
> System: Bad selector: 0007
> System: Bad selector: 0D87
> System: Bad selector: 001F
> System: Bad selector: 0007
> GP at 0020 21D4 EC 0DC4
> Error 269 loadin
On 04/13/2012 05:25 PM, Takuya Yoshikawa wrote:
> I forgot to say one important thing -- I might give you wrong impression.
>
> I am perfectly fine with your lock-less work. It is really nice!
>
> The reason I say much about O(1) is that O(1) and rmap based
> GET_DIRTY_LOG have fundamentally diffe
21 matches
Mail list logo